Search alternatives:
algorithm within » algorithm its (Expand Search)
using function » using fusion (Expand Search)
Showing 241 - 260 results of 302 for search '(( algorithm within function ) OR ( algorithm using function ))*', query time: 0.09s Refine Results
  1. 241

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. …”
    Get full text
    Get full text
    Get full text
    article
  2. 242
  3. 243

    Fixed set search applied to the multi-objective minimum weighted vertex cover problem by Raka Jovanovic (17947838)

    Published 2022
    “…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …”
  4. 244

    Parallel tabu search in a heterogeneous environment by Al-Yamani, A.

    Published 2003
    “…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …”
    Get full text
    Get full text
    article
  5. 245
  6. 246

    A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks by Shaik, Muzibur Rehman

    Published 2007
    “…OSPF calculates the shortest paths from each source to all destinations using the Dijkstra’s algorithm based on the weights assigned to the links. …”
    Get full text
    masterThesis
  7. 247

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics by Naila Rabbani (291722)

    Published 2022
    “…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
  8. 248

    Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining by Mohammadjafar Hadad (21142499)

    Published 2024
    “…To evaluate a robust algorithm, a method is devised that involves different networks utilizing various activation functions and neuron sizes to distinguish and select the best architecture for this study. …”
  9. 249

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
    Get full text
    Get full text
    article
  10. 250

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 251

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 252

    Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators by I.S. Elkamash (16810689)

    Published 2023
    “…In this work, we use appropriate hypergeometric functions to approximate a divergent series ( n! …”
  13. 253

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
    Get full text
    Get full text
    Get full text
    article
  14. 254

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…Arrays with different number of elements and various illumination functions were investigated. The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  15. 255

    Design of a TE-pass reflection mode optical polarizer by Khan, M.A.

    Published 2003
    “…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. The analysis of the filter is carried out numerically using the method of lines with a perfectly matched layer in order to absorb the radiative field. …”
    Get full text
    Get full text
    article
  16. 256

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  17. 257
  18. 258

    Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants by Abouzeid M. Shalaby (16810695)

    Published 2021
    “…Since strong-coupling behavior is not yet known for the renormalization group functions of the O(N)-symmetric φ 4 theory, we used weak-coupling and largeorder parametrization to resum the seven-loop critical exponents ν, η and ω for N = 0, 1, 2, 3, 4. …”
  19. 259

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 260

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet by Imran Siddique (12705185)

    Published 2024
    “…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …”